nby-jimeng-api
Fail
Audited by Gen Agent Trust Hub on Apr 1, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONCREDENTIALS_UNSAFEDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill instructs the user to clone an untrusted third-party repository (
github.com/wwwzhouhui/jimeng-free-api-all.git) and execute a Python script from it (scripts/logout-sessions.py) as seen inreferences/seedance.md. - [EXTERNAL_DOWNLOADS]: The documentation provides commands to download and run a Docker image from an untrusted individual's account (
wwwzhouhui569/jimeng-free-api-all:latest) inSKILL.md. - [COMMAND_EXECUTION]: The troubleshooting section includes a command that pipes output from a network request directly into the Python interpreter:
curl -s http://localhost:8000/v1/models | python3 -m json.tool. This pattern is risky as a compromised or malicious local service could return executable code. - [EXTERNAL_DOWNLOADS]: The skill directs the user to perform
pip install playwright && playwright install chromium, which downloads and executes binaries from external registries without integrity verification. - [CREDENTIALS_UNSAFE]: The skill accesses and sources sensitive credentials (
JIMENG_SESSION_ID) from.envfiles located in the project directory and the user's home directory (~/.nby-skills/nby-jimeng-api/.env). - [INDIRECT_PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it processes untrusted data from an external API without sanitization.
- Ingestion points: Reads JSON responses containing model lists, task statuses, and
revised_promptfields fromlocalhost:8000(documented inSKILL.mdandreferences/api-detail.md). - Boundary markers: No delimiters or instructions to ignore embedded commands are present when handling API output.
- Capability inventory: The skill uses
Bash,Read, andWritetools to execute powerful commands likedocker,curl,git, andpython3. - Sanitization: There is no evidence of validation or escaping for data returned by the API service before it is used by the agent.
Recommendations
- HIGH: Downloads and executes remote code from: http://localhost:8000/v1/models - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata